Journal: Science in China Series F: Information Sciences

Volume 62, Issue 3

32101 -- 0Ya Liu 0001, Yifan Shi, Dawu Gu, Bo Dai, Fengyu Zhao, Wei Li, Zhiqiang Liu, Zhiqiang Zeng. Improved impossible differential cryptanalysis of large-block Rijndael
32102 -- 0Rui Zong, Xiaoyang Dong, Xiaoyun Wang. Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256
32103 -- 0Zhitao Guan, Yue Zhang, Liehuang Zhu, Longfei Wu, Shui Yu. EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid
32104 -- 0Jingting Xue, Chunxiang Xu, Jining Zhao, Jianfeng Ma. Identity-based public auditing for cloud storage systems against malicious auditors via blockchain
32105 -- 0Wei Wei, Jiazhe Chen, Dan Li, Beibei Wang. Partially known information attack on SM2 key exchange protocol
32106 -- 0Yi Guo, Fu Miao, Liancheng Zhang, Yu Wang. CATH: an effective method for detecting denial-of-service attacks in software defined networks
32107 -- 0MeiHui Chen, Hua Chen, Limin Fan, Shaofeng Zhu, Wei Xi, Dengguo Feng. A new discrete Fourier transform randomness test
32108 -- 0Hailun Yan, Yiyuan Luo, Mo Chen, Xuejia Lai. New observation on the key schedule of RECTANGLE
32109 -- 0Yanbing Wu, Haining Fan, Xiaoyun Wang, Guangnan Zou. A regulated digital currency
32110 -- 0Zhenbin Yan 0001, Yi Deng. A novel approach to public-coin concurrent zero-knowledge and applications on resettable security
32111 -- 0Shiyao Chen, Ru Liu, Tingting Cui, Meiqin Wang. Automatic search method for multiple differentials and its application on MANTIS
32112 -- 0Kamel Ammour, Lei Wang, Dawu Gu. Pseudo random oracle of Merkle-Damgård hash functions revisited
32113 -- 0Junwei Zhang, Ning Lu, Jianfeng Ma, Chao Yang 0016. Universally composable secure geographic area verification without pre-shared secret
39101 -- 0Xueqing Wang, Biao Wang, Bei Liang, Rui Xue 0001. A more compact multi-id identity-based FHE scheme in the standard model and its applications
39102 -- 0Chensi Wu, Tao Wen, Yuqing Zhang. A revised CVSS-based system to improve the dispersion of vulnerability risk scores
39103 -- 0Yusong Du, Baodian Wei, Huang Zhang. A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers
39104 -- 0Bo Yang 0025, Xiaofeng Liao. Some characteristics of logistic map over the finite field
39105 -- 0Sen Xu, Weija Wang, Xiangjun Lu, Zheng Guo 0001, Junrong Liu, Dawu Gu. q)-application to secure RSA-CRT
39106 -- 0Chunliu Yan, Ziyi Ni, Bin Cao 0003, Rongxing Lu, Shaohua Wu, Qinyu Zhang. UMBRELLA: user demand privacy preserving framework based on association rules and differential privacy in social networks
39107 -- 0Jia Zhang, Hai-Xin Duan, Jian Jiang, Jinjin Liang, Jianping Wu. Finding the best answer: measuring the optimization of public and authoritative DNS
39108 -- 0Ruishan Xin, Yidong Yuan, Jiaji He, Yuehui Li, Yiqiang Zhao. High-efficient generation algorithm for large random active shield
39109 -- 0Tairong Shi, Jie Guan. Real-time state recovery attack against MORUS in nonce-misuse setting
39110 -- 0Jianghua Zhong, Dongdai Lin. Decomposition of nonlinear feedback shift registers based on Boolean networks
39111 -- 0Haijiang Wang, Xiaolei Dong, Zhenfu Cao, Dongmei Li, Nanyuan Cao. Secure key-aggregation authorized searchable encryption